research
∙
06/19/2023
Cyber Key Terrain Identification Using Adjusted PageRank Centrality
The cyber terrain contains devices, network services, cyber personas, an...
research
∙
06/29/2022
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
Identification of cyber threats is one of the essential tasks for securi...
research
∙
06/21/2022